Enabling access to a secured wireless local network without user input of a network password
First Claim
1. A method comprising:
- identifying, at a security device of a secured wireless network, a wireless-enabled device that is not authorized to access the secured wireless network;
receiving, at the security device from the wireless-enabled device, user input of identification information for a user of the wireless-enabled device, wherein the user input does not include a network password for the secured wireless network;
sending, from the security device, an access request message directed to a messaging address in response to the user input, wherein the access request message includes the identification information, includes a first selectable option to allow the wireless-enabled device access to the secured wireless network without requiring user input of the network password via the wireless-enabled device, and includes a second selectable option to deny the wireless-enabled device access to the secured wireless network;
receiving a response to the access request message at the security device; and
responsive to the response indicating selection of the first option, send an encryption key from the security device to the wireless-enabled device to enable the wireless-enabled device to communicate encrypted communications via the secured wireless network.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes identifying, at a security device of a secured wireless network, a wireless-enabled device that is not authorized to access the secured wireless network. The method also includes sending an access request message directed to a messaging address in response to identifying the wireless-enabled device. The access request message includes information that identifies the wireless-enabled device includes a first selectable option to allow access to the secured wireless network without requiring user input of a network password associated with the secured wireless network via the wireless-enabled device. The access request message also and includes a second selectable option to deny access to the secured wireless network.
25 Citations
20 Claims
-
1. A method comprising:
-
identifying, at a security device of a secured wireless network, a wireless-enabled device that is not authorized to access the secured wireless network; receiving, at the security device from the wireless-enabled device, user input of identification information for a user of the wireless-enabled device, wherein the user input does not include a network password for the secured wireless network; sending, from the security device, an access request message directed to a messaging address in response to the user input, wherein the access request message includes the identification information, includes a first selectable option to allow the wireless-enabled device access to the secured wireless network without requiring user input of the network password via the wireless-enabled device, and includes a second selectable option to deny the wireless-enabled device access to the secured wireless network; receiving a response to the access request message at the security device; and responsive to the response indicating selection of the first option, send an encryption key from the security device to the wireless-enabled device to enable the wireless-enabled device to communicate encrypted communications via the secured wireless network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a processor configured to control access to a secured wireless network; a memory coupled to the processor, the memory comprising instructions executable by the processor to; identify a wireless-enabled device that is not authorized to access the secured wireless network; receive, from the wireless-enabled device, user input of identification information for a user of the wireless-enabled device, wherein the user input does not include a network password for the secured wireless network; send an access request message directed to a messaging address in response to the user input, wherein the access request message includes the identification information, includes a first selectable option to allow the wireless-enabled device access to the secured wireless network without requiring user input of the network password via the wireless-enabled device, and includes a second selectable option to deny the wireless-enabled device access to the secured wireless network; receive a response to the access request message; and responsive to the response indicating selection of the first option, send an encryption key to the wireless-enabled device to enable the wireless-enabled device to communicate encrypted communications via the secured wireless network. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-readable storage device comprising instructions, that when executed by a processor configured to control access to a secured wireless network, cause the processor to perform operations including:
-
identifying a wireless-enabled device that is not authorized to access the secured wireless network; receiving, from the wireless-enabled device, user input of identification information for a user of the wireless-enabled device, wherein the user input does not include a network password for the secured wireless network; sending an access request message directed to a messaging address in response to the user input, wherein the access request message includes the identification information, includes a first selectable option to allow the wireless-enabled device access to the secured wireless network without requiring user input of the network password via the wireless-enabled device, and includes a second selectable option to deny the wireless-enabled device access to the secured wireless network; receiving a response to the access request message; and responsive to the response indicating selection of the first option, sending an encryption key to the wireless-enabled device to enable the wireless-enabled device to communicate encrypted communications via the secured wireless network. - View Dependent Claims (17, 18, 19, 20)
-
Specification